Unix Unleashed, System Administrator's Edition pdf

948  Download (0)

Full text

(1)

UNIX Unleashed, System

Administrator's Edition

Table of Contents

Introduction

Part I - Introduction to UNIX

Chapter 1 - The UNIX Operating System

Chapter 2 - Getting Started: Basic Tutorial

Chapter 3 - Additional UNIX Resources

Chapter 4 - The UNIX File System

Chapter 5 - General Commands

Chapter 6 - Getting Around the Network

Chapter 7 - Communicating with Others

Part II - UNIX Shells

Chapter 8 - What Is a Shell?

Chapter 9 - The Bourne Shell

Chapter 10 - The Bourne Again Shell

Chapter 11 - The Korn Shell

Chapter 12 - The C Shell

Chapter 13 - Shell Comparison

Part III - System Administration

Chapter 14 - What Is System Administration

Chapter 15 - UNIX Installation Basics

Chapter 16 - Starting Up and Shutting Down

(2)

Chapter 17 - User Administration

Chapter 18 - File System and Disk Administration

Chapter 19 - Kernel Configuration

Chapter 20 - Networking

Chapter 21 - System Accounting

Chapter 22 - Performance and Tuning

Chapter 23 - Device Administration

Chapter 24 - Mail Administration

Chapter 25 - News Administration

Chapter 26 - UUCP Administration

Chapter 27 - FTP Administration

Chapter 28 - Backing Up and Restoring Your System

Glossary

(3)

UNIX® Unleashed, System

Administrator's Edition

Robin Burk and David B. Horvath, CCP, et al

Dedication

To Stephen P. Kowalchuk, who provided an IS manager and practicing network administrator's

point of view.

----Robin Burk

This edition is dedicated to my parents and grandparents. Education and doing one's best was

always important to them.

----David B. Horvath

Acknowledgments

Special thanks to Roger for support and grocery shopping. Also to the Laurelwood English Cockers,

who intuitively understand how to negotiate a communications session (beg), allocate resources (if

it's on the counter, it's ours!), and travel in encapsulated cells (show crates) over broadband highway

networks.

----Robin Burk

As with all the other projects I get involved with, my wife and muse, Mary, has been tremendously

supportive. Even when I spent my evenings and weekends at the keyboard. Of course, she filled her

time by shopping (she said this, not me).

My parents, brothers, and the rest of family, who always wondered about the time I spent with

computers, are now seeing the concrete results of it all.

I've been involved with this project for close to a year now. The development staff were very helpful

and have certainly kept it interesting. I want to thank them and the other authors (especially those

that I talked into helping out). This certainly turned out to be a bigger project (and resulting book)

than any of us expected. I hope and expect that people will be looking at these two volumes as

the

definitive reference!

(4)

especially with the effort this one entailed, I miss them when I'm not working on one.

---- David B. Horvath

About the Authors

Robin Burk has over 25 years' experience in advanced software, computer, and data

communications technologies. She has provided technical and managerial leadership for the

development of language tools, communications software, operating systems, and multimedia

applications. A successful executive in entrepreneurial companies, she consults on software product

development and the use of the Internet for business success. Robin's undergraduate degree is in

physics and math. She also holds an MBA in finance and operations. Robin's other passion is

breeding, training, and showing dogs. She moderates an e-mail list for English Cocker Spaniel

fanciers and can be reached at robink@wizard.net.

David B. Horvath, CCP, is a Senior Consultant with CGI Systems, Inc., an IBM Company, in the

Philadelphia, Pennsylvania area. He has been a consultant for over twelve years and is also a

part-time Adjunct Professor at local colleges teaching topics that include C Programming, UNIX,

and Database Techniques. He is currently pursuing an M.S. degree in Dynamics of Organization at

the University of Pennsylvania. He has provided seminars and workshops to professional societies

and corporations on an international basis. David is the author of "UNIX for the Mainframer" and

numerous magazine articles.

When not at the keyboard, he can be found working in the garden or soaking in the hot tub. He has

been married for over ten years and has several dogs and cats.

David can be reached at unx2@cobs.com for questions related to this book. No Spam please!

Fred Trimble holds a master's degree in computer science from Villanova University. In his nine

years with Unisys Corporation, he held many positions, including UNIX system administrator, C

programmer, and Oracle database administrator. Currently, he is a senior consultant and instructor

with Actium Corporation in Conshohocken, Pennsylvania, specializing in C++, Java, and the Brio

data warehousing product line. He is currently pursuing a master's degree in software engineering

from Drexel University.

Sanjiv Guha has 14 years of experience in managing and developing financial and other application

systems. He specializes in C, UNIX, C++, Windows, and COBOL. Sanjiv holds a Master of

Technology Degree from Indian Institute of Technology, New Delhi, India.

William A. Farra's computer career started in the summer of 1978, working in a time sharing shop

on a IBM 365. It had 768 KB, 8 disk packs totaling 125 MB and a cost of 10 million dollars. That

fall, Mr. Farra went to the University of Delaware for electrical engineering and worked part time at

Radio Shack playing with the trash 80's. He continued to work for the Shack until he met a bright

guy who was writing custom programs for the larger computers the Shack sold. Bill took a full time

job with him in September of 1983, working on Microsoft's first versions of UNIX (called Xenix at

the time) and writing BASIC and C code.

(5)

various clients in the Philadelphia area including "Dan Peter Kopple and Associates," the architects

who renovated 30th Station. Since 1991, Bill has returned to employment, developing and/or

enhancing various systems including "Fraud Detection Delivery System" for MBNA and Settlement

systems for EPS "MAC card ATM processor." Recently he got away from the "Big Cities" and is

living at the Jersey Shore. He is a lead developer for National Freight Industries, working with

various UNIX based systems including real-time tracking of vehicles using national transportation

satellite and ground-based networks. Always keeping an eye on the future, Bill is just having more

fun doing it now.

Richard E. Rummel, CDP, is the president of ASM Computing, Jacksonville, Florida, which

specializes in UNIX software development and end user training. He has been actively employed in

the computer industry for over 20 years. Married for 25 years, he is the father of two children, a dog,

and a cat.

Sriranga Veeraraghavan is earning his B.E. from UC Berkeley in 1997. He is a GUI designer on

UNIX, and currently uses Java for multiple Web-based applications. He is currently working at

Cisco Systems. Sriranga amuses himself with Perl, Marathon and MacsBugs.

Christopher Johnson is currently studying at Sheffield Hallam University in the UK for a degree in

Electronic and Information Engineering. He is mostly self taught in the computer field, with

experience being gained from helping other students, people on Usenet, and colleagues at work. He

is part of a team that administers a Linux server on the university's network, and administers a web

server on it. When not working, his interests include cycling and music, and he enjoys traveling.

John Valley lives in Richmond, Virginia with his wife Terri and his Labrador retriever, Brandon.

Mr. Valley currently operates a small practice as an independent consultant for UNIX and Windows

tools and applications. With more than 20 years of experience in the computer industry, his

background ranges from Cobol business applications and mainframe operating system development

to UNIX tools and Windows programming. He teaches courses in C/C++ programming and UNIX

fundamentals.

Mr. Valley has published three books on UNIX topics and was a contributing author for the first

edition of UNIX Unleashed.

Sydney S. Weinstein, CDP, CCP, is a consultant, columnist, lecturer, author, professor, and

president of Myxa Corporation, an Open Systems technology company specializing in helping

companies move to and work with Open Systems. He has 20 years experience with UNIX dating all

the way back to Version 6.

Sean Drew is a distributed object software developer, working primarily with UNIX, C++, and

CORBA. Sean is married to his college sweetheart Sheri and together they have two children, Dylan

Thomas and Terran Caitlin. At the time of this writing a third child is on the way, and depending on

the gender will probably be named Erin Nichole, Brenna Nichole, or Ryan Patrick. When Sean is not

busy with his family or church, he likes to brew beer. Anybody up for a nice imperial stout? Sean

can be reached at ninkasi@worldnet.att.net.

(6)

developing new market data and transaction distribution systems.

Ron Rose is an international management consultant with over 20 years of data processing

management experience. He has led large-scale data processing installations in Asia, Europe, and the

United States, and he has managed several software product start-up efforts. He completed a master's

in information systems from Georgia Institute of Technology after completing undergraduate work at

Tulane University and the University of Aberdeen, Scotland.

Lance Cavener is co-founder of Senarius. His function is to provide support to employers in Eastern

Canada. Tasks such as payroll, work force deployment, and more are part of his business. He is also

the President and Senior Network Administrator of ASCIO Communications, a subsidiary of

Senarius. He provides the public and businesses with Internet related services. Lance has been

actively involved in UNIX since 1990, as an administrator for corporate networks at various

companies in Eastern Canada. His work includes working with BIND/DNS, Sendmail, Usenet setup,

web servers, and UNIX security. He has also written various programs for SunOS, MS-DOS,

MS-Windows, and VMS.

David Gumkowski currently is a senior systems analyst for Digital Systems Group, Inc.,

Warminster, PA. Nineteen years ago, he emerged from his computing womb at Purdue University

and cut his system administration teeth using Control Data and Texas Instruments machines. For the

last 11 years, he developed his UNIX skills prodding Sun, Hewlett Packard, Digital Equipment and

Silicon Graphics machines to behave for approximately 3,000 users. He would publicly like to thank

his wife and children for their support when trying new things like writing chapters for this book.

John Semencar is a senior software analyst for Thomas Jefferson University, Philadelphia, PA.

Beginning system administration on Control Data legacy systems 10 years ago, and with a

background that also includes DEC and SGI, he presently surrounds himself with Hewlett Packard

9000 servers running HP-UX v10.x. He would like to thank his wife Georgia and little Buster for

their support.

Steve Shah is a systems administrator for the Center of Environmental Research and Technology at

the University of California, Riverside. He received his B.S. in Computer Science with a minor in

Creative Writing from UCR and is currently working on his M.S. there as well. In his copious spare

time, he enjoys writing fiction, DJing, and spending time with his friends, family, and sweet, Heidi.

Daniel Wilson currently performs UNIX Systems Administration and Database Administration

work for the Defense Finance and Accounting Services Financial Systems Organization, which is a

financial organization within the Department of Defense.

William D. Wood currently works at Software Artistry, Inc as a support specialist on UNIX

systems. He supports the Expert Advisor software it runs on SUN OS, HP-UX and IBM AIX. He has

specialized in multi-systems and remote systems support since 1985, when he started work at the

Pentagon. He has solely supported infrastructures that span the world and just the U.S. He has also

supported up to 80 UNIX machines at one time.

William G. Pierce currently performs UNIX Systems Administration and is the Technical Lead for

the MidTier Management Operation at the Defense Finance and Accounting Services, Financial

Services Organization, Indianapolis, Indiana.

(7)

mainly specializing in UNIX, NetWare, and mainframe connectivity. He also designs and

implements TCP/IP-based networks and enterprise network management solutions. Salim holds a

master's degree in electrical engineering from the American University of Beirut. His experience and

main career interests have primarily been in internetworking, multiplatform integration, and network

analysis and management.

Chris Byers is a systems administrator for a financial securities firm in Philadelphia. As a former

consultant and disaster recovery specialist, he has many years of experience in the UNIX world with

its many different variants. He lives in South Jersey with his wife, his son, and his cat. He can be

reached at

southst@voicenet.com

.

Jeff Smith is a psychology major who took a wrong turn and ended up working with computers. Jeff

has worked with UNIX systems since 1982 as a programmer and systems administrator. He has

administered mail, news, security, and the domain name system on several varieties of UNIX

including 2.9 BSD, 4.3 BSD, Dynix, SunOS, and AIX.

James C. Armstrong, Jr. is a software engineer with more than ten years of industry experience

with UNIX and C.

James Edwards (

jamedwards@deloitte.ca) is an IT professional experienced in data

communications, network integration, and systems design in both North America and Europe. He

holds an M.S. in information technology from the University of London and a B.A. (Hons) from

Middlesex University, both in the United Kingdom. James currently resides in Toronto, Canada,

where he is employed as a manager with the Deloitte & Touche Consulting Group. His spare time is

taken up with his girls, Denise, Lauren, and Poppy.

Tell Us What You Think!

As a reader, you are the most important critic and commentator of our books. We value your opinion

and want to know what we're doing right, what we could do better, what areas you'd like to see us

publish in, and any other words of wisdom you're willing to pass our way. You can help us make

strong books that meet your needs and give you the computer guidance you require.

Do you have access to the World Wide Web? Then check out our site at

http://www.mcp.com

.

NOTE:

If you have a technical question about this book, call the technical support line

at 317-581-3833 or send e-mail to

support@mcp.com

.

As the team leader of the group that created this book, I welcome your comments. You can fax,

e-mail, or write me directly to let me know what you did or didn't like about this book--as well as

what we can do to make our books stronger. Here's the information:

Fax:

317-581-4669

(8)

Mail:

Dean Miller

Comments Department

Sams Publishing

201 W. 103rd Street

Indianapolis, IN 46290

Introduction

by Robin Burk and David B. Horvath, CCP

Welcome to UNIX Unleashed, System Administrator's Edition.

Who Should Read This Book

Our highly popular first edition brought comprehensive, up-to-date information on UNIX to a wide

audience. That original edition was already 1,600 pages. The new topics covered in this edition have

obliged us to split the second edition into two volumes, namely, the System Administrator's Edition

and the Internet Edition, which we'll refer to jointly as "the new" or the second edition. Though each

volume can stand alone and may be read independently of the other, they form a complementary set

with frequent cross-references. This new edition is written for:

People new to UNIX

Anyone using UNIX who wants to learn more about the system and its utilities

Programmers looking for a tutorial and reference guide to C, C++, Perl, awk, and the UNIX

shells

System administrators concerned about security and performance on their machines

Webmasters and Internet server administrators

Programmers who want to write Web pages and implement gateways to server databases

Anyone who wants to bring his or her UNIX skills and knowledge base up-to-date

A lot has happened in the UNIX world since the first edition of UNIX Unleashed was released in

1994. Perhaps the most important change is the tremendous growth of the Internet and the World

Wide Web. Much of the public Internet depends on UNIX-based servers. In addition, many

corporations of all sizes have turned to UNIX as the environment for network and data servers. As

UNIX fans have long known, the original open operating system is ideal for connecting

heterogeneous computers and networks into a seamless whole.

What's New in UNIX Unleashed, Second Edition

This edition of UNIX Unleashed includes a substantial amount of new information describing

Internet and World Wide Web technologies in UNIX. New topics include:

Programming Web pages with HTML

Object-oriented programming in C++

(9)

Programming Common Gateway Interfaces (CGI) using Perl, C/C++, HTML, and the UNIX

shells

MIME, the Multipurpose Internet Mail Extension

HTTP, the HyperText Transfer Protocol

Web servers and server performance

As UNIX becomes the platform of choice for critical network and data applications, UNIX vendors

have placed increased emphasis on system maturity, ease-of-use, and security capabilities. Even with

the growth of Microsoft Windows NT, UNIX still has a place in the industry. It is more mature,

more stable, more scaleable, and has a wider array of applications than NT. Many people claim that

NT is the open operating system of the future; that may be true (I have my own personal opinion),

but for now, UNIX holds that place.

We've also updated this edition of UNIX Unleashed to bring you current information regarding:

Frequently Asked Questions (FAQs) about the most popular variants of UNIX

Security issues and the technologies you can use to protect your system and its information

against intruders and malicious users

The most popular Graphical User Interfaces (GUIs)

As with the original edition, we set out to bring users the most comprehensive, useful, and up-to-date

UNIX guide. To meet this goal, we've added nearly two dozen new chapters and have revised much

of the original material in the book. The resulting book is so large that it is now divided into two

volumes. The System Administrator's Edition introduces UNIX and contains much of the

information required for basic users and for systems administrators. The Internet Edition includes

advanced information for programmers, Internet/Web developers, and those who need detailed

information regarding specific UNIX flavors.

Coverage of Popular UNIX Variants

Based on input from some of the experts, application developers, consultants, and system

administrators working in industry, we have provided information about a number of the UNIX

variants. We split the variants into two categories: major and minor. This is not a comment on the

quality or capabilities of the variant, but on the penetration in the marketplace (popularity).

We consider AIX, HP-UX, Solaris, and SVR4 to be major and BSD, IRIX, Linux, and SunOS to be

minor players in the marketplace. There are other variants; the next edition may cover them as they

become more popular.

You can identify where something specific to a variant is discussed by the icon next to it:

AIX--major--IBM's version that runs on the RS/6000 series of RISC systems and mainframes.

Over 500,000 RS/6000 systems have been sold!

BSD--minor--This version has a lesser presence in the marketplace. Although many variants

can trace their heritage to BSD, it is not that popular as a product.

HP-UX--major--Hewlett Packard's (HP) version with a strong hardware presence in the

marketplace and a strong future growth path.

IRIX--minor--While the Silicon Graphics (SGI) machines are wonderful for graphics, they

(10)

have not found wide acceptance in business environments.

Linux--minor--Although this is a very nice and free variant, it has little commercial presence

in the marketplace (probably because corporations do not want to run their mission-critical

applications without a vendor they can sue when there is a problem). See the SAMS Linux

Unleashed series books (Red Hat and Slackware) for detailed information.

Solaris--major--Sun Microsystems' version with a strong hardware presence in the

marketplace and a strong future growth path.

SunOs--minor--Largely being superseded by Solaris installations. A good variant, but it is

difficult for a company to support two versions of UNIX at a time.

SVR4--major--This version has a strong presence in the marketplace. In addition, many

variants can trace their heritage to System V Release 4.

CD-ROM Contents

We've also enhanced our CD-ROM with a C compiler, the most popular Web server software, and

megabytes of other useful tools and information. The CD-ROM packaged with each volume contains

exactly the same software and materials. Here are some of the noteworthy inclusions:

The entire text of both volumes in HTML format

Listings and code examples from various chapters in the volume

FreeBSD 2.2.5, full binary release

Linux RedHat 4.2, full binary release [x86 platform only]

BASH, sources and documentation.

sendmail version 8.7

RFCs 821, 822, 1425, 1123, 976, 977, 1036

latest version of INN source code

GNU findutils 4.1

GNU fileutils 3.16

xv-3.10a

disktool (v2.0)

tcl/tk

screen

xarchie

xrn

SATAN

Crack (or equivalent)

Perl 5.x

LaTeX

Lynx

elm and pine

pico

(11)

UNIX sort utility

GNU awk, gawk

APACHE web server

GNU C compiler

emacs editor

gtar

gzip

gcc

gmake

NCSA Web Server

asWedit

missinglink

Weblint

Isearch and Isearch-cgi

@cgi.pm

LessTif 0.80 sources Linux & FreeBSD bins

fvwm window manager

Enlightenment window manager

libg 2.7.2 (useful companion to C compiler)

acroread, Adobe Acrobat PDF reader (for Linux and FreeBSD)

To make use of the CD-ROM easier, whenever a reference in print is made to the CD-ROM, you

will see an icon. You can also scan through the text to find the CD-ROM icons to find more

information the disk contents.

Enjoy!

How These Volumes are Organized

The books are divided into parts (detailed information about each volume is in the next sections).

Each volume also contains a glossary of terms and an index.

Whenever there is special information you should pay attention to, it will be placed in a blocks to

grab your attention. There are three types of special blocks: note, tip, and caution.

NOTE:

A note is used to provide you with information that you may want to pay

attention to but is not critical. It provides you with information that can be critical but

should not cause too much trouble.

(12)

exposure to problems (and how they were solved).

CAUTION:

A caution is used to grab your attention to prevent you from doing

something that would cause problems. Pay close attention to cautions!

The icons shown in the CD-ROM Contents and Coverage of Popular UNIX Variants sections also

provide a quick means of referencing information.

How the System Administrator's Edition Is

Organized

The first volume, UNIX Unleashed, Systems Administrator Edition, consists of three major sections

or parts. The general focus is getting you started using UNIX, working with the shells, and then

administering the system.

Part I, Introduction to UNIX, is designed to get you started using UNIX. It provides you with the

general information on the organization of the UNIX operating system, how and where to find files,

and the commands a general user would want to use. Information is also provided on how to get

around the network and communicating with other users on the system.

Part II, UNIX Shells, provides you the information on how to choose which shell to use and how to

use that shell. The most popular shells: Bourne, Bourne Again (BASH), Korn, and C, are covered as

well as a comparison between them. Under UNIX, the shell is what provides the user interface to the

operating system.

Part III, System Administration, gets you started and keeps you going with the tasks required to

administer a UNIX system. From installation through performance and tuning, the important topics

are covered. The general duties of the system administrator are described (so you can build a job

description to give to your boss). In case you are working on a brand-new UNIX system, the basics

of UNIX installation are covered. Other topics covered in this section include: starting and stopping

UNIX, user administration, file system and disk administration, configuring the kernel (core of the

operating system), networking UNIX systems, accounting for system usage, device (add-on

hardware) administration, mail administration, news (known as netnews or UseNet) administration,

UUCP (UNIX to UNIX Copy Program, an early networking method still in wide use today)

administration, FTP (File Transfer Protocol) administration, and finally, backing up and restoring

files.

How the Internet Edition Is Organized

The second volume, UNIX Unleashed, Internet Edition, consists of seven major parts. The general

focus is programming (GUI, application languages, and the Internet), text formatting (which

involves embedding commands in your text and then processing it), security considerations

(13)

Part I, Graphical User Interfaces, provides you with information about using and writing GUI

applications. When the operating system is UNIX, the GUI is the X-windowing system.

Part II, Programming, introduces the most popular program development tools in the UNIX

environment. The most important part is how to enter your program (editing with vi and emacs)! The

awk, Perl, C, and C++ programming languages are covered. Awk and Perl are interpreted languages

designed for quick program development. C is the compiled language developed by Kernighan and

Ritchie--UNIX is written in this language. C++ is an enhancement to the C language that supports

object oriented programming. The final chapter in this section discusses the

make

utility, which

provides a rule-based method to control program compilation.

Part III, Text Formatting and Printing, covers the tools that support the development, formatting, and

printing of documents in the UNIX environment. These tools were much of the original justification

for hardware that was used to develop UNIX. The formatting programs,

nroff

and

troff

, the

standard macro packages, and many of the other document preparation tools are covered. In addition,

developing your own text formatting macros is discussed.

Part IV, Security, is an advanced area of systems administration. One of the criticisms of UNIX is

that it is not secure. It was developed in an environment where the individuals were trusted and

sharing information was important. UNIX is capable of being very secure; you just have to know

how to set it up. This section provides that information. The risks, available tools, and helpful

organizations are covered.

Part V, UNIX and the Internet, introduces the tools used with the world wide web and the

transmission of binary files via email (MIME). The web page definition language, HTML, is

introduced, along with the methods of developing CGI (Common Gateway Interface--programs that

run on the web server processing data from web pages) programs in shell scripting languages, Perl,

and C/C++. Administrative information is provided in chapters on HTTP (HyperText Transport

Protocol) and monitoring server activity.

Part VI, Source Control, covers the tools that UNIX provides to maintain control of your source code

as different versions (and revisions) are created. The three major tools are RCS, CVS, and SCCS.

Part VII, Frequently Asked Questions, provides answers, as the name implies, to the most frequently

asked questions about the various variants of UNIX. AIX, BSD, HP-UX, Linux, Solaris, SVR4, and

IRIX are covered in individual chapters.

Conventions Used in This Volume

This book uses the following typographical conventions:

Menu names are separated from the individual menu options with a vertical bar (|). For

example, "File|Save" means "Select the File menu and then choose the Save option."

New terms appear in italic.

All code appears in

monospace

. This includes pseudocode that is used to show a general

format rather than a specific example.

Words that you are instructed to type appear in

monospace bold

.

(14)

Placeholders (words that stand for what you actually type) appear in

italic monospace

.

Lines of code that are too long to fit on only one line of this book are broken at a convenient

place and continued on the next line. A code continuation character (

) precedes the new

line. Any code that contains this character should be entered as one long line without a line

break.

An ellipsis (...) in code indicates that some code has been omitted for the sake of brevity.

(15)

UNIX Unleashed, System Administrator's Edition

Copyright©, Macmillan Computer Publishing. All rights reserved.

No part of this book may be used or reproduced in any form or by any means, or stored in a database

or retrieval system without prior written permission of the publisher except in the case of brief

quotations embodied in critical articles and reviews.

For information, address Macmillan Publishing, 201 West 103rd Street, Indianapolis, IN 46290.

(16)

UNIX Unleashed, System Administrator's Edition

1

-The UNIX Operating System

by Rachel and Robert Sartin, and Robin Burk

Welcome to the world of UNIX. Once the domain of wizards and gurus, today UNIX has spread beyond the

university and laboratory to find a home in global corporations and small Internet servers alike. This ability to

scale up or down, to accommodate small installations or complex corporate networks with little or no

modification, is only one of the characteristics that have won UNIX its popularity and widespread use.

As we'll see through the course of this book, UNIX is a rich and complex system built upon simple, powerful

elements. Although many more recent operating systems have borrowed concepts and mechanisms from

UNIX, those who are most familiar with legacy mainframe environments, or whose experience is mostly

limited to single-user personal computers, may find UNIX to be a bit intimidating at first. The best advice I

can give is to take it slowly, but don't give up. As you read through these chapters and begin to use some of

the features and utilities described in this book, you'll find that once-foreign ideas have taken clear and

concrete shape in your mind.

NOTE:

One distinctive characteristic of UNIX compared to other operating systems is the fact

that there are several flavors, or variants, of the operating system. Because the source code of the

early versions was made available to a variety of computer manufacturers and third parties, many

slightly different forms of UNIX co-exist. Some are specific to a given hardware manufacturer;

others differ in the utilities, configuration methods or user interfaces they offer. In this book, we

will call your attention to the differences among the most commonly used UNIX variants,

including:

HP-UX (Hewlett Packard)

Solaris (SunSoft)

SVR4 (AT&T)

AIX (IBM)

Other UNIX variants we will examine in these two volumes include:

BSD (Berkeley Software)

Linux

SunOS (predecessor to Solaris)

IRIX

(17)

TIP:

Throughout these two volumes, you will find specific details regarding how to accomplish

tasks in each of the most popular versions of UNIX. In addition, Part VII in the second volume,

UNIX Unleashed, Internet Edition, contains one chapter each of answers to Frequently Asked

Questions for each major UNIX flavor.

At its base UNIX is both simple and elegant, with a consistent architecture that, in turn, underlies and guides

the design of its many application programs and languages. If you are new to UNIX, I want you to know that

I'm a bit jealous of the fun you'll have as you begin to explore this fascinating environment for the first time. If

you are a more experienced UNIX user, administrator, or programmer, this revised edition of UNIX Unleashed

contains a wealth of information that can help you extend your UNIX use to Internet and World Wide Web

applications, guard against hackers and other unauthorized intruders, and fine-tune your system management

skills.

What is UNIX?

UNIX is:

A trademark of Novell Corporation

A multitasking, multiuser operating system

The name given to a whole family of related operating systems and their most common application,

utility, and compiler programs

A rich, extensible, and open computing environment

Let's take these one at a time. To begin with, UNIX is a trademark, which means that there is intellectual

property associated with UNIX that is not in the public domain. Some versions of UNIX require a paid license

for their use.

The term UNIX also refers to a powerful multitasking, multiuser operating system.

Once upon a time, not so long ago, everyone knew what an operating system (OS) was. It was the complex

software sold by the maker of your computer system, without which no other programs could function on that

computer. It spun the disks, lit the terminals, and generally kept track of what the hardware was doing and

why. Application (user) programs asked the operating system to perform various functions; users seldom

talked to the OS directly.

Today those boundaries are not quite so clear. The rise of graphical user interfaces, macro and scripting

languages, suites of applications that can exchange information seamlessly, and the increased popularity of

networks and distributed data--all of these factors have blurred the traditional distinctions. Today's computing

environments consist of layers of hardware and software that interact together to form a nearly organic whole.

At its core (or, as we say in UNIX, in the kernel), however, UNIX does indeed perform the classic role of an

operating system. Like the mainframe and minicomputer systems that came before, UNIX enables multiple

people to access a computer simultaneously and multiple programs and activities to proceed in parallel with

one another.

(18)

Those who do not care much for these programs, however, will find themselves free to substitute their own

approach for getting various computing jobs done. A salient characteristic of UNIX is that it is extensible and

open. By extensible, I mean that UNIX allows the easy definition of new commands, which can then be

invoked or used by other programs and terminal users. This is practical in the UNIX environment because the

architecture of the UNIX kernel specifically defines interfaces, or ways that programs can communicate with

one another without having been designed specifically to work together.

Understanding Operating Systems

An operating system is an important part of a computer system. You can view a computer system as being

built from three general components: the hardware, the operating system, and the applications. (See Figure

1.1.) The hardware includes pieces such as a central processing unit (CPU), a keyboard, a hard drive, and a

printer. You can think of these as the parts you are able to touch physically. Applications are why you use

computers; they use the rest of the system to perform the desired task (for example, play a game, edit a memo,

send electronic mail). The operating system is the component that on one side manages and controls the

hardware and on the other manages the applications.

Figure 1.1.

Computer system components.

When you purchase a computer system, you must have at least hardware and an operating system. The

hardware you purchase is able to use (or run) one or more different operating systems. You can purchase a

bundled computer package, which includes the hardware, the operating system, and possibly one or more

applications. The operating system is necessary in order to manage the hardware and the applications.

When you turn on your computer, the operating system performs a series of tasks, presented in chronological

order in the next few sections.

Hardware Management, Part 1

One of the first things you do, after successfully plugging together a plethora of cables and components, is

turn on your computer. The operating system takes care of all the starting functions that must occur to get your

computer to a usable state. Various pieces of hardware need to be initialized. After the start-up procedure is

complete, the operating system awaits further instructions. If you shut down the computer, the operating

system also has a procedure that makes sure all the hardware is shut down correctly. Before turning your

computer off again, you might want to do something useful, which means that one or more applications are

executed. Most boot ROMs do some hardware initialization but not much. Initialization of I/O devices is part

of the UNIX kernel.

Process Management

After the operating system completes hardware initialization, you can execute an application. This executing

application is called a process. It is the operating system's job to manage execution of the application. When

you execute a program, the operating system creates a new process. Many processes can exist simultaneously,

but only one process can actually be executing on a CPU at one time. The operating system switches between

your processes so quickly that it can appear that the processes are executing simultaneously. This concept is

referred to as time-sharing or multitasking.

When you exit your program (or it finishes executing), the process terminates, and the operating system

manages the termination by reclaiming any resources that were being used.

(19)

perform these tasks, the program makes requests to the operating system, and the operating system responds to

the requests and allocates necessary resources to the program. When an executing process needs to use some

hardware, the operating system provides access for the process.

Hardware Management, Part 2

To perform its task, a process may need to access hardware resources. The process may need to read or write

to a file, send data to a network card (to communicate with another computer), or send data to a printer. The

operating system provides such services for the process. This is referred to as resource allocation. A piece of

hardware is a resource, and the operating system allocates available resources to the different processes that

are running.

See Table 1.1 for a summary of different actions and what the operating system (OS) does to manage them.

Table 1.1. Operating system functions.

Action

OS Does This

You turn on the computer

Hardware management

You execute an application

Process management

Application reads a tape

Hardware management

Application waits for data

Process management

Process waits while other process runs Process management

Process displays data on screen

Hardware management

Process writes data to tape

Hardware management

You quit, the process terminates

Process management

You turn off the computer

Hardware management

From the time you turn on your computer until you turn it off, the operating system is coordinating the

operations. As hardware is initialized, accessed, or shut down, the operating system manages these resources.

As applications execute, request, and receive resources, or terminate, the operating system takes care of these

actions. Without an operating system, no application can run and your computer is just an expensive

paperweight.

The UNIX Operating System

The previous section looked at operating systems in general. This section looks at a specific operating system:

UNIX. UNIX is an increasingly popular operating system. Traditionally used on minicomputers and

workstations in the academic community, UNIX is now available on personal computers, and the business

community has started to choose UNIX for its openness. Previous PC and mainframe users are now looking to

UNIX as their operating system solution. This section looks at how UNIX fits into the operating system

model.

(20)

The UNIX system is actually more than strictly an operating system. UNIX includes the traditional operating

system components. In addition, a standard UNIX system includes a set of libraries and a set of applications.

Figure 1.2 shows the components and layers of UNIX. Sitting above the hardware are two components: the

file system and process control. Next is the set of libraries. On top are the applications. The user has access to

the libraries and to the applications. These two components are what many users think of as UNIX, because

together they constitute the UNIX interface.

Figure 1.2.

The layers of UNIX.

The part of UNIX that manages the hardware and the executing processes is called the kernel. In managing all

hardware devices, the UNIX system views each device as a file (called a device file). This allows the same

simple method of reading and writing files to be used to access each hardware device. The file system

(explained in more detail in Chapter 4, "The UNIX File System") manages read and write access to user data

and to devices, such as printers, attached to the system. It implements security controls to protect the safety

and privacy of information. In executing processes (see Chapter 18), the UNIX system allocates resources

(including use of the CPU) and mediates accesses to the hardware.

One important advantage that results from the UNIX standard interface is application portability. Application

portability is the ability of a single application to be executed on various types of computer hardware without

being modified. This can be achieved if the application uses the UNIX interface to manage its hardware needs.

UNIX's layered design insulates the application from the different types of hardware. This allows the software

developer to support the single application on multiple hardware types with minimal effort. The application

writer has lower development costs and a larger potential customer base. Users not only have more

applications available, but can rely on being able to use the same applications on different computer hardware.

UNIX goes beyond the traditional operating system by providing a standard set of libraries and applications

that developers and users can use. This standard interface allows application portability and facilitates user

familiarity with the interface.

The History of UNIX

How did a system such as UNIX ever come to exist? UNIX has a rather unusual history that has greatly

affected its current form.

The Early Days

In the mid-1960s, AT&T Bell Laboratories (among others) was participating in an effort to develop a new

operating system called Multics. Multics was intended to supply large-scale computing services as a utility,

much like electrical power. Many people who worked on the Bell Labs contributions to Multics later worked

on UNIX.

In 1969, Bell Labs pulled out of the Multics effort, and the members of the Computing Science Research

Center were left with no computing environment. Ken Thompson, Dennis Ritchie, and others developed and

simulated an initial design for a file system that later evolved into the UNIX file system. An early version of

the system was developed to take advantage of a PDP-7 computer that was available to the group.

(21)

AT&T was not allowed to market computer systems, so it had no way to sell this creative work from Bell

Labs. Nonetheless, the popularity of UNIX grew through internal use at AT&T and licensing to universities

for educational use. By 1977, commercial licenses for UNIX were being granted, and the first UNIX vendor,

Interactive Systems Corporation, began selling UNIX systems for office automation.

Later versions developed at AT&T (or its successor, Unix System Laboratories, now owned by Novell)

included System III and several releases of System V. The two most recent releases of System V, Release 3

(SVR3.2) and Release 4 (SVR4; the most recent version of SVR4 is SVR4.2) remain popular for computers

ranging from PCs to mainframes.

All versions of UNIX based on the AT&T work require a license from the current owner, UNIX System

Laboratories.

Berkeley Software Distributions

In 1978, the research group turned over distribution of UNIX to the UNIX Support Group (USG), which had

distributed an internal version called the Programmer's Workbench. In 1982, USG introduced System III,

which incorporated ideas from several different internal versions of and modifications to UNIX, developed by

various groups. In 1983, USG released the original UNIX System V, and thanks to the divestiture of AT&T,

was able to market it aggressively. A series of later releases continued to introduce new features from other

versions of UNIX, including the internal versions from the research group and the Berkeley Software

Distribution.

While AT&T (through the research group and USG) developed UNIX, the universities that had acquired

educational licenses were far from inactive. Most notably, the Computer Science Research Group at the

University of California at Berkeley (UCB) developed a series of releases known as the Berkeley Software

Distribution, or BSD. The original PDP-11 modifications were called 1BSD and 2BSD. Support for the

Digital Equipment Corporation VAX computers was introduced in 3BSD. VAX development continued with

4.0BSD, 4.1BSD, 4.2BSD, and 4.3BSD, all of which (especially 4.2 and 4.3) had many features (and much

source code) adopted into commercial products.

UNIX and Standards

Because of the multiple versions of UNIX and frequent cross-pollination between variants, many features

have diverged in the different versions of UNIX. With the increasing popularity of UNIX in the commercial

and government sector came the desire to standardize the features of UNIX so that a user or developer using

UNIX could depend on those features.

The Institute of Electrical and Electronic Engineers (IEEE) created a series of standards committees to create

standards for "An Industry-Recognized Operating Systems Interface Standard based on the UNIX Operating

System." The results of two of the committees are important for the general user and developer. The POSIX.1

committee standardizes the C library interface used to write programs for UNIX. (See UNIX Unleashed,

Internet Edition, Chapter 6, "The C and C++ Programming Languages.") The POSIX.2 committee

standardizes the commands that are available for the general user.

In Europe, the X/Open Consortium brings together various UNIX-related standards, including the current

attempt at a Common Open System Environment (COSE) specification. X/Open publishes a series of

specifications called the X/Open Portability. The MOTIF user interface is one popular standard to emerge

from this effort.

(22)

Various commercial consortia have attempted to negotiate UNIX standards as well. These have yet to

converge on an accepted, stable result.

UNIX for Mainframes and Workstations

Many mainframe and workstation vendors make a version of UNIX for their machines. We will be discussing

several of these variants (including Solaris from SunSoft, AIX from IBM and HP-UX from Hewlett Packard)

throughout this book.

UNIX for Intel Platforms

Thanks to the great popularity of personal computers, there are many UNIX versions available for Intel

platforms. Choosing from the versions and trying to find software for the version you have can be a tricky

business because the UNIX industry has not settled on a complete binary standard for the Intel platform. There

are two basic categories of UNIX systems on Intel hardware: the SVR4-based systems and the older, more

established SVR3.2 systems.

SVR4 vendors include NCR, IBM, Sequent, SunSoft (which sells Solaris for Intel), and Novell (which sells

UnixWare). The Santa Cruz Operation (SCO) is the main vendor in the SVR3.2 camp.

Source Versions of "UNIX"

Several versions of UNIX and UNIX-like systems have been made that are free or extremely cheap and

include source code. These versions have become particularly attractive to the modern-day hobbyist, who can

now run a UNIX system at home for little investment and with great opportunity to experiment with the

operating system or make changes to suit his or her needs.

An early UNIX-like system was MINIX, by Andrew Tanenbaum. His book Operating Systems: Design and

Implementations describes MINIX and includes a source listing of the original version of MINIX. The latest

version of MINIX is available from the publisher. MINIX is available in binary form for several machines

(PC, Amiga, Atari, Macintosh, and SPARCStation).

The most popular source version of UNIX is Linux (pronounced "lin nucks". Linux was designed from the

ground up by Linus Torvalds to be a free replacement for UNIX, and it aims for POSIX compliance. Linux

itself has spun off some variants, primarily versions that offer additional support or tools in exchange for

license fees. Linux has emerged as the server platform of choice for small to mid-sized Internet Service

Providers and Web servers.

Making Changes to UNIX

Many people considering making the transition to UNIX have a significant base of PC-based MS-DOS and

Microsoft Windows applications. There have been a number of efforts to create programs or packages on

UNIX that would ease the migration by allowing users to run their existing DOS and Windows applications on

the same machine on which they run UNIX. This is a rapidly changing marketplace as Microsoft evolves its

Windows and Windows NT operating systems.

Introduction to the UNIX Philosophy

(23)

on all UNIX systems. There are several common key items throughout UNIX:

Simple, orthogonal commands

Commands connected through pipes

A (mostly) common option interface style

No file types

For detailed information on commands and connecting them together, see the chapters on shells (Chapters

8-13) and on common commands (Chapters 5--9).

Simple, Orthogonal Commands

The original UNIX systems were very small, and the designers tried to take every advantage of those small

machines by writing small commands. Each command attempted to do one thing well. The tools could then be

combined (either with a shell script or a C program) to do more complicated tasks. One command, called wc,

was written solely to count the lines, words, and characters in a file. To count all the words in all the files, you

would type wc * and get output like that in Listing 1.1.

Listing 1.1. Using a simple command.

$ wc *

351 2514 17021 minix-faq

1011 5982 42139 minix-info

1362 8496 59160 total

$

Commands Connected Through Pipes

To turn the simple, orthogonal commands into a powerful toolset, UNIX enables the user to use the output of

one command as the input to another. This connection is called a pipe, and a series of commands connected by

pipes is called a pipeline. For example, to count the number of lines that reference MINIX in all the files, one

would type grep MINIX * | wc and get output like that in Listing 1.2.

Listing 1.2. Using a pipeline.

$ grep MINIX * | wc

105 982 6895

$

A (Mostly) Common Option Interface Style

Each command has actions that can be controlled with options, which are specified by a hyphen followed by a

single letter option (for example, -l). Some options take option arguments, which are specified by a hyphen

followed by a single letter, followed by the argument (for example, -h Header). For example, to print on

pages with 16 lines each all the lines in the file minix-info that mention Tanenbaum, you would enter wc

minix-info | pr -l 16 and get output like that in Listing 1.3.

Listing 1.3. Using options in a pipeline.

$ grep Tanenbaum minix-info | pr -l 16

(24)

[From Andy Tanenbaum <ast@cs.vu.nl> 28 August 1993]

The author of MINIX, Andrew S. Tanenbaum, has written a book describing

Author: Andrew S. Tanenbaum

subjects.ast (list of Andy Tanenbaum's

Andy Tanenbaum since 1987 (on tape)

Version 1.0 is the version in Tanenbaum's book, "Operating Systems: Design

$

The bad news is that some UNIX commands have some quirks in the way they handle options. As more

systems adopt the standards mentioned in the section "The History of UNIX," you will find fewer examples of

commands with quirks.

No File Types

UNIX pays no attention to the contents of a file (except when you try to run a file as a command). It does not

know the difference between a spreadsheet file and a word processor file. The meaning of the characters in a

file is entirely supplied by the command(s) that uses the file. This concept is familiar to most PC users, but

was a significant difference between UNIX and other earlier operating systems. The power of this concept is

that any program can be used to operate on any file. The downside is that only a program that understands the

file format can fully decode the information in the file.

Summary

UNIX has a long history as an open development environment. More recently, it has become the system of

choice for both commercial and some personal uses. UNIX performs the typical operating system tasks, but

also includes a standard set of commands and library interfaces. The building-block approach of UNIX makes

it an ideal system for creating new applications.

(25)

UNIX Unleashed, System Administrator's Edition

2

-Getting Started: Basic Tutorial

by Rachel and Robert Sartin

UNIX is a multi-user, multi-tasking environment. Unlike personal computers, UNIX systems are inherently

designed to allow simultaneous access to multiple users.

Whether you are working with UNIX on a large, multi-user system or have a dedicated UNIX-based

workstation on your desk, the multi-user, multi-tasking architecture of the operating system influences the

way you will work with the system and the requirements it will place on you as a user and a system

administrator.

The purpose of this chapter is to acquaint you with the basics of UNIX from the user's point of view. Not all

UNIX boxes actually support multiple users with keyboards or terminals of their own. Some workstations

are dedicated to a single person, and others function as servers that support multiple remote computers rather

than end users. In all cases, however, UNIX operates as if it might be called upon to furnish a fully

multi-user, multi-tasking capability. For the purpose of this tutorial, we'll assume that you have a dedicated

UNIX workstation on your desk.

Logging In to the System

Several people can be using a UNIX-based computer at the same time. In order for the system to know who

you are and what resources you can use, you must identify yourself. In addition, since UNIX expects to

communicate with you over a terminal (or a PC running terminal-emulation software), your terminal and the

UNIX system must establish the ground rules that will govern the transfer of information. The process of

establishing the communications session and identifying yourself is known as "logging in."

NOTE:

UNIX actually distinguishes between a communications session and a login session, in

that it is possible to log in as one user, log out, and log in again as another user without

disrupting the communications session. Because an increasing number of people access UNIX

systems from a PC, and for purposes of simplicity in this tutorial, we've treated the

(26)

User Account Setup

After a UNIX system is booted, you cannot simply start using it as you do a PC. Before you can access the

computer system, someone--usually the system administrator--must configure the computer for your use. If

you are running UNIX on your PC at home, you will most likely need to do these things for yourself. If you

are a UNIX novice trying to set up your home computer system, you can refer to Chapter 15, "UNIX

Installation Basics." If you are using a computer system in your place of work, your employer may have a

person or persons whose specific job it is to administer all the systems. If this is the case, you will have to

coordinate with a staff member to set up your system account. The company may have an application form

on which you can request such things as a certain user name, a temporary password, which shell you want to

use (see Chapter 13, "Shell Comparison"), what your default group is, what groups you should belong to, and

which mail aliases you should be added to. Many of these things will depend on what work you will be

doing and whom you will be working with.

No matter who sets up your computer account, you must know two things before you can use the system:

your user name and your password. If you don't know what these are, you must stop and find out what has

been assigned to you. The user name is a unique name that identifies you to the system. It is often related to

your real name, such as your first name, your last name, or a combination of first initial and last name (for

example, "frank," "brimmer," or "fbrimmer," respectively). If you get to request a user name, try to choose

something that makes others think of you alone, and is not vague or common enough to cause confusion with

others. The system administrator will verify that no one else on your system has this name before allowing

you to have it. The password that you request or that has been assigned to you is a temporary string that

allows you to initially access the computer system. The initial password isn't of any real importance because

you should change it to something of your choice the first time you log in to the system (see "Managing

Your Password" later in this chapter).

The other items on the account application form are harder for a novice user to determine. Asking a peer who

uses the same system for the values his or her account has might be a good place to start. The system

administrator may be able to help you figure out what values you should have. But don't worry; these are all

easily changed later if you wish.

Logging In to the System

Now that you know your user name (say it's "brimmer") and password (say it's "new_user"), you can access

the system. When you sit down in front of a UNIX workstation, you are expected to log in to the system. The

system prompts (asks) you for your user name by printing

login:

. You should then enter your user name.

Next, UNIX prompts you for your password by printing

Password:

. Enter your password. As you type

your password, don't be alarmed if the characters you type are not displayed on your screen. This is normal

and is for your protection. No one else should know your password, and this way no one can look at your

screen and see your password when you log in.

login: brimmer

Password:

Please wait...checking for disk quotas

Marine biology word of the day:

Cnidaria (n.) Nigh-DARE-ee-uh (L. a nettle) - a phylum of basically

radially symmetrical marine invertebrates including corals, sea

anemones, jellyfish and hydroids. This phylum was formerly known

as Coelenterata.

(27)

TIP:

Some keyboards have a key labeled "Return." Some have a key labeled "Enter." If your

keyboard has both, "Return" is probably the correct key to use.

TIP:

On some systems, erase is # and kill is @. On others, erase is Backspace or Delete and kill

is Control+U or Control+X.

If you typed everything correctly and the system administrator has everything set up correctly, you are now

logged in and may use the system. If you get a message saying

Login Incorrect

, you may have typed

your user name or password incorrectly. If you make a mistake during your user name, the Backspace key

and the Delete key may not undo this mistake for you. The easiest thing to do is to start over by pressing

Enter twice to get to a new

login:

prompt.

Other error messages you might receive are

No Shell

,

No Directory

, or

Cannot Open Password

File

. If you see any of these messages, or if multiple attempts at logging in always produce the

Login

Incorrect message, contact your system administrator for help.

TIP:

The

No Shell

message means that UNIX is not able to start the command interpreter,

which was configured when your account was set up. Depending on the UNIX system, your

login may complete successfully and the default shell will be used. If this happens, you can use

the

chsh

command, which will change the shell specified in your account. See Part II, "UNIX

Shells," for more information about various shells. The

No Directory

message means that

UNIX cannot access your home directory, which was specified when your account was set up.

Again, depending on the system, your login may complete successfully, placing you in a default

directory. You may need to then enlist the help of the system administrator to create your home

directory or change the home directory value for your account. See Chapter 4, "The UNIX File

System," regarding directories and, specifically, your home directory. The Cannot Open

Password File

message means that UNIX is having a problem accessing the system

password file, which holds the account information (user name, password, user id, shell, group,

and so on) for each user. If there is a problem with this file, no user can log in to the system.

Contact your system administrator if you see this message.

If your system is configured to use a graphical user interface (GUI), you probably have a login screen. This

screen performs the same function as the command-line prompts but is presented as a graphical display. The

display probably has two boxes for you to fill in, each with a label. One box is for your user name and the

other is for your password.

After Login Succeeds

After a successful login, several messages appear on your screen. Some of these may be the date and time of

your last login, the system's informative message (called the "Message of the Day"), and a message

informing you whether you have (electronic) mail. The Message of the Day can be an important message to

watch because it is one way that administrators communicate with the system users. The next scheduled

down time (when no one can use the system) is an example of information that you might see here.

After all the messages scroll by, the system is ready and waiting for you to do something. This

Figure

Table 1.1. Operating system functions.

Table 1.1.

Operating system functions. p.19
Figure 4.1.

Figure 4.1.

p.58
Table 6.2. Common ftp service commands.

Table 6.2.

Common ftp service commands. p.186
table exist before trying to execute them. Commands that no longer exists aresearched for in $PATH.Setting this shell option forces bash to check the window size after each

table exist

before trying to execute them. Commands that no longer exists aresearched for in $PATH.Setting this shell option forces bash to check the window size after each p.307
Table 11.1. Tilde expansion styles.

Table 11.1.

Tilde expansion styles. p.319
Table 11.2. Extended pattern-matching expressions.

Table 11.2.

Extended pattern-matching expressions. p.320
Table 11.7. vi command editing: Command-mode commands.

Table 11.7.

vi command editing: Command-mode commands. p.331
Table 11.11. Variables used by the Korn shell.

Table 11.11.

Variables used by the Korn shell. p.338
Table 11.13. Arithmetic operators in the Korn shell.

Table 11.13.

Arithmetic operators in the Korn shell. p.347
Table 11.15. -f option forms.

Table 11.15. -

f option forms. p.352
Table 11.17. Job reference argument syntax.

Table 11.17.

Job reference argument syntax. p.362
Table 12.4. C shell command-line options.

Table 12.4.

C shell command-line options. p.394
Table 12.11. Arithmetic and logical shell operators.

Table 12.11.

Arithmetic and logical shell operators. p.414
Table 12.12. File-testing expressions.

Table 12.12.

File-testing expressions. p.416
Table 13.3. Nonportable shell features--Programming.

Table 13.3.

Nonportable shell features--Programming. p.450
Table 16.1. Action keyword table.

Table 16.1.

Action keyword table. p.498
Table 16.2. Signals used with kill command.

Table 16.2.

Signals used with kill command. p.498
Figure 19.3). Tracks are concentric rings going from the outside perimeter to the center of the disk, with each track becomingsmaller as it approaches the center of the disk

Figure 19.3).

Tracks are concentric rings going from the outside perimeter to the center of the disk, with each track becomingsmaller as it approaches the center of the disk p.560
Figure 19.6.Diagram of an Inode Structure of a UNIX filesystem

Figure 19.6.Diagram

of an Inode Structure of a UNIX filesystem p.562
Figure 20.16.IP data routing.

Figure 20.16.IP

data routing. p.578
Table 20.2. Traditional top level domains.

Table 20.2.

Traditional top level domains. p.585

References